Cloud computing holds great potential for both the private sector and the public administration in Europe. Simultaneously, data protection and data security in the cloud have a high priority in order to provide confidence in the context of the revelations about the NSA’s activities critical to cloud computing.

Cloud computing continues to evolve as fast as the different seasons experienced nowadays. But the challenging issue all businesses are facing is the skills gap between cloud projects and the technology requirements needed in accomplishing the task. The lack of appropriate skills creates an imbalance for enterprises that in the end can [...]

In spite of the widespread belief that bringing data on the systems to an external service provider would create doubts on security, Gartner believes that the market for cloud security is among those set to grow more in recent years.

According to Gartner report, the market for cloud-based security will hit [...]

The demand for cloud computing is strengthen when the companies have reached the awareness that they need to provide innovative IT services while reducing costs. The cloud model promotes investment in technology, allowing scheduling, provisioning, with a rapid and dynamic management of virtualized computing resources on demand.

Cloud-based systems are attractive as a standard part of the corporate landscape, because they are usually cheaper, faster and easier to deploy than internal IT systems. The path to the cloud is a must for most enterprise, however, an assessment of information risk precede that takes into account the complexities of cloud [...]

A growing number of CIOs and IT departments are turning to the cloud to help them gain a competitive advantage for their business, reduce costs and do more with less. Nearly three-quarters of CIOs agreed that they were already using the cloud.

With the aim of offering an assessment of the current situation of mobile computing and current threats to protect them, the Cloud Security Alliance (CSA) has published a guide specializing in critical areas with recommendations on best practices in this area.

Cloud computing services are increasingly moving into the future in health care. However, the protection and security of private data are two of the main reasons why the healthcare sector is generally slow to adopt new technologies. Market researchers at MarketsandMarkets assume that the health care industry will invest $5.4 [...]

Small and Medium sized businesses can take a lot of benefit from embracing business cloud solutions. Cloud platforms allow SMEs to compete in the cloud giant-controlled environment, and gives the level playing field required to succeed in business.

Some small and medium companies are yet to fully realize the advantages that [...]

The future is definitely all in the hands of the cloud, so that several large IT companies already have a specific business line dedicated to cloud strategy. Experts predict that by 2020 the spread of the cloud, which allows access to applications via the Web from anywhere (including via smartphone) and at [...]

After almost a week of Google’s announcement that it will start to encrypt by default its Cloud Storage application, it is now being implemented. It initially encrypted the server-side of its new and active data even before they are stored in the cloud, then it will be followed by processing of old [...]

Revealed by Edward Snowden, the NSA spying program has had many repercussions, particularly in political, diplomatic and civil. The result was the commercial consequences envisaged with suspension of TAFTA agreement by Europeans countries.

Cloud business solutions have been growing at a skyrocketing speed especially Software-as-a-Service (SaaS). Companies, however, need to realize that cloud contracts have a lot of security loopholes that need to be addressed ASAP. Cloud contracts have a lot of growing up to do according to the results of the [...]

Regardless of whether it’s accurate or unfair, China has always had a poor reputation in the West when it comes to protection of Intellectual Property, as the country is usually associated with knockoffs of patented designs and rampant piracy. To make matters worse, the Chinese government always seemed to have bigger fish [...]

The Aberdeen Group states that cloud is the core, mobile its edge and social the connections are lie between endpoints. It places the disruptive technologies that are transforming businesses in context, and describes the technical and services infrastructure needed to provide that ideal end‐user experience where everyone’s connected (social), everywhere they go [...]